29 current 2025-10-07 15:47:05 25.05.20251001.5b5be50 6.12.49 *

This commit is contained in:
2025-10-07 16:20:46 -05:00
parent 9c27c4049d
commit ccf136c79f
4 changed files with 40 additions and 24 deletions

View File

@@ -20,5 +20,17 @@ in
acceptTerms = true;
defaults.email = "me@blakedheld.xyz";
};
# nginx secrets
sops.secrets = {
"ssl_blakedheld_crt" = {
owner = "nginx";
group = "nginx";
};
"ssl_blakedheld_key" = {
owner = "nginx";
group = "nginx";
};
};
};
}

View File

@@ -20,6 +20,7 @@ in
backup = lib.mkOption {
type = lib.types.bool;
default = true;
description = "enable backups for <service_name>";
};
};

View File

@@ -18,36 +18,39 @@ in
age.keyFile = "/home/blake/.config/sops/age/keys.txt";
secrets = {
# define secrets with the following syntax
# secret path is the nesting of headings in the yaml file
# the secret is auto place in /run/<path to secret> path allows you to symlink to the /run to where ever is needed
# "<secret_name/path>" = {
# owner = "<user>";
# group = "<group>";
# path = "<path on system to place flile>"
# };
# blake user secrets
lib.mkIf config.users.blake.enable {
"blake_passwd" = {
owner = "root";
group = "root";
neededForUsers = true;
};
}
"tailscale_authkey" = lib.mkIf config.modules.system.tailscale.enable {
owner = "root";
};
# backups secrets
"borg_passwd" = lib.mkIf config.modules.system.backups.enable {
owner = "root";
group = "root";
};
"blake_passwd" = lib.mkIf config.users.blake.enable {
# tailscale secrets
"tailscale_authkey" = lib.mkIf config.modules.system.tailscale.enable {
owner = "root";
group = "root";
neededForUsers = true;
};
"ssl_blakedheld_crt" = lib.mkIf config.modules.homelab.nginx-proxy.enable {
owner = "nginx";
group = "nginx";
};
"ssl_blakedheld_key" = lib.mkIf config.modules.homelab.nginx-proxy.enable {
owner = "nginx";
group = "nginx";
};
# nginx secrets
# lib.mkIf config.modules.homelab.nginx-proxy.enable {
# "ssl_blakedheld_crt" = {
# owner = "nginx";
# group = "nginx";
# };
#
# "ssl_blakedheld_key" = {
# owner = "nginx";
# group = "nginx";
# };
# }
};
};
};